Pass the RSA RSA Certified SE Professional 050-SEPROGRC-01 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Events can be used to trigger a number of different layout effects, based on a user’s interaction with other fields in the application. Which of the following actions CANNOT be triggered by an Event?

Options:

A.

Delete a record


B.

Generate an email notification


C.

Make a field conditionally required


D.

Populate a values list with a selected value


Expert Solution
Questions # 12:

The Policy Management solution enables companies to implement a workflow process that will ensure exceptions to policies are properly documented and reviewed. What is the name of the application that includes this process?

Options:

A.

Policies


B.

Question Library


C.

Control Procedures


D.

Exception Requests


Expert Solution
Questions # 13:

When a notification isn’t received as expected, it is likely something is configured incorrectly in:

Options:

A.

The Notification Reports


B.

The configuration database


C.

The notification template itself


D.

The application supporting the notification


Expert Solution
Questions # 14:

What is the minimum operating system requirement for the RSA Archer Web Server?

Options:

A.

Microsoft Windows 2000 Server


B.

Microsoft Windows Server 2003


C.

Microsoft Windows Server 2003 R2


D.

Microsoft Windows Server 2008


Expert Solution
Questions # 15:

What DBMS (database server product) is used for RSA Archer?

Options:

A.

MySQL


B.

Oracle Database


C.

Microsoft SQL Server


D.

Sybase Adaptive Server Enterprise


Expert Solution
Questions # 16:

When a new questionnaire is created, the administrator can pull questions stored in which of the following RSA Archer applications to be used in the questionnaire?

Options:

A.

Findings


B.

Question Library


C.

Authoritative Sources


D.

Manage Questionnaires


Expert Solution
Questions # 17:

If an RSA Archer user cannot see an application that does exist within the system, what should the administrator check first?

Options:

A.

She should verify the user belongs to at least one group.


B.

She should verify the user has been assigned a role that grants access to the application.


C.

She should confirm the user is named within a Record Permissions field within the application.


D.

She should verify the user has been granted access rights to Private fields within the application.


Expert Solution
Questions # 18:

If an administrator wanted to edit a field in an application, which module should she access on the Administration tab?

Options:

A.

Integration


B.

Access Control


C.

Application Builder


D.

Management Reporting


Expert Solution
Questions # 19:

Log files are written in:

Options:

A.

C#


B.

.NET


C.

XML


D.

HTML


Expert Solution
Questions # 20:

Which solution should be recommended for customers who would like to implement a “whistleblower” issue reporting option for their end users?

Options:

A.

Policy Management


B.

Threat Management


C.

Incident Management


D.

Compliance Management


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions